The 2012 political races were dominated by a debate about the “makers” vs. the “takers” among the American electorate. But it was government agencies themselves that were taken—by hackers, security flaws and employee ineptitude. Government agencies, from small county election boards to NASA, suffered data breaches. In fact, our federal and state governments have lost… Read More

My phone rings whenever a client is hacked, suffers a data breach, or is a victim of identity theft via digital means. My job as chief information security officer is to look at all the digital evidence. When possible, I reconstruct the cyber attack. It’s C.S.I. work. By reconstructing the attack, often I can tell… Read More

It’s another manic Monday, and you’re racing to drop off the kids, fight traffic, and get to work in time—to watch the Olympics. Americans are putting in time at the office—not to do actual work, but to watch Misty May-Treanor and Kerri Walsh Jennings go for gold in beach volleyball. Or the hot, post-Hunger Games… Read More

By Ondrej Krehel By now you’ve all seen the video of American gymnast Aly Raisman’s parents wincing, twisting and turning in their seats as they watched their daughter compete for Team USA in the Olympics gymnastics competition. (If you’ve been off the grid, check it out here.) We know how they feel, because when we see… Read More

How do most corporate data breaches happen? Lost laptops and USB drives. Now many businesses have some kind of security practice in place for lost corporate computers, whether it’s encrypted drives with remote wipe, or a call lost-and-reporting procedure. But how many have USB drive best practices on the books? Not many. Yet USBs, because… Read More

As our smartphones have become our wallets and personal computers, holding everything from banking to social network information, they’ve become targets for hackers, scammers and criminals. Our phones hold a treasure trove of data—and the bad guys know it. A screen lock is no longer enough. Dream Droid, a botnet-type of malware program, recently infected… Read More

There’s been a lot of commentary and gotcha-style journalism surrounding the Sony data breach, but not much constructive criticism. Yes, the breach could have easily been prevented. Had Sony enabled fairly standard firewall technology and kept its systems up-to-date with the latest patches, none of this most likely would have happened. Since most of us… Read More

Are you being tracked online? The answer is yes. There are financial incentives for everyone from malicious hackers, to scheming governments, to an industry that has found a way to monetize your digital habits. Behavioral marketing—delivering ads to consumers based on their activity online—is an estimated $80 billion industry. The goal is to sell: cars,… Read More

Technology outpaces the law every day. New features are being adopted much faster than law enforcement and the court systems can keep up. This is a given at the high-speed crossroads of hi-tech and capitalism. Last fall, the federal courts covered some of the escaping ground as it relates to GPS tracking. An October editorial… Read More

The offers that appear on Credit.com’s website are from companies from which Credit.com receives compensation. This compensation may influence the selection, appearance, and order of appearance of the offers listed on the website. However, this compensation also facilitates the provision by Credit.com of certain services to you at no charge. The website does not include all financial services companies or all of their available product and service offerings.